From 11e3e6e472781b2078c9179e344abd42ece2cb53 Mon Sep 17 00:00:00 2001 From: root Date: Tue, 25 Jan 2022 23:00:12 +0000 Subject: Minor changes --- paper.ms | 22 ++++++++++++---------- 1 file changed, 12 insertions(+), 10 deletions(-) (limited to 'paper.ms') diff --git a/paper.ms b/paper.ms index 9275254..63572db 100644 --- a/paper.ms +++ b/paper.ms @@ -45,24 +45,26 @@ governments access to unencrypted Internet communications so that suspicious activity can be flagged and investigated in order to prevent a terror attack or in order to better respond in the case of an attack. Graham describes the extensive use of end to end encryption -used by terrorists in order to avoid interception by the autorities. +used by terrorists in order to avoid interception by the authorities. Due to U.S. usage of intercepted communications to uncover and prevent a number of al-Qa'ida plots, the terrorist organisation and other terrorist groups have increasingly used encrypted communications (read citation from Graham). An significant factor is the use of non-mainstreams software in early use of encryption by terrorists, -including a program that built a rapper around the popular, secure, +including a program that built a wrapper around the popular, secure, and open source PGP called \fIMujahedeen secrets\fR. Although now terrorists and criminals use widely available, popular, and user-friendly software such as the Tails operating system or Telegram -(Graham citation 28), Messaging -technologies and their support for `end-to-end encryption' is a -particularly significant issue. Introduction of end-to-end encryption -being introduced by large companies such as Facebook has raised -concern {conversation facebook} over the potential for usage by -criminals and a lack of ability for Facebook or law enforcement to -obtain conversation between criminals which may be vital in an -investigation. +(Graham citation 28), terrorists organisations have shown an ability +to make use of more obscure and complicated systems, as well as use +publicly available source code in order to construct software for +operatives to use. Messaging technologies and their support for +`end-to-end encryption' is a particularly significant issue. +Introduction of end-to-end encryption being introduced by large +companies such as Facebook has raised concern {conversation facebook} +over the potential for usage by criminals and a lack of ability for +Facebook or law enforcement to obtain conversation between criminals +which may be vital in an investigation. Concerns exist with digital technologies on at a hardware level. The Intel Management Engine that exists {Intel Management} -- cgit v1.2.3